(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

Related People

Abstract

A procedure is given below for dynamically allocating bandwidth on a time-divided loop, extending from a primary (host) station to a number of secondary stations (devices) and returning finally to the primary station.

Country

United States

Language

English (United States)

This text was extracted from a PDF file.

This is the abbreviated version, containing approximately
85% of the total text.

Page 1 of 1

Bandwidth Allocation on Multiplex Loop

A procedure is given below for dynamically allocating bandwidth on a time-
divided loop, extending from a primary (host) station to a number of secondary
stations (devices) and returning finally to the primary station.

Typically, the primary sends a "cyclic" initiating signal delimiting an
indeterminate series of time frames available for utilization by the secondaries.
The secondaries "seize" these frames in accordance with a predetermined
protocol and send message blocks to the primary. The problem presently
addressed is to permit participation in each series by a maximum number of
secondaries, without having device "overruns".

The procedure involves monitoring (e.g., at the primary station) current-loop
load ("cycle" length) and minimum OF (overrun time factor) of all devices active
(participating) currently. This information is used to control authorization of
inactive devices to participate (become active).